In a hub and spoke environment, what measures can be taken to make sure that spoke sites have limited application access or no access to other spoke sites? Customer has business partners/ business units as spoke sites and is paranoid.
Thanks!
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.